Carbon Black, which is a founding member of the Blue Coat Alliance Ecosystem of Endpoint Detection and Response (EDR) partner program, says the integration is now available free of charge to joint customers using Carbon Black version 5.0 and above and Blue Coat Malware Analysis Appliance.

A typical integration would for instance enable Carbon Black to automatically send unknown files to Blue Coat’s Malware Analysis Appliance for detonation and analysis. Based on the results, file scores and alerts are immediately sent to Carbon Black, where further investigation can take place. This extends Blue Coat Malware Analysis capabilities to Carbon Black to protect devices from activities that would traditionally evade network security protections, such as off-network downloads or USB devices.

Another example of integration would provide a quick pivot integration into Carbon Black. This enables administrators to quickly see if a file executed on an endpoint and, if so, take necessary incident response actions such as endpoint isolation, live response, or attack banning.

“Thousands of companies depend upon Blue Coat technology to defend their networks. This integration will enable organizations to extend those protections down to the endpoint with Carbon Black. By uniting endpoint detection and response, and network detonation and analytics, organisations can leverage both endpoint and network investments to achieve better security,” concluded Tom Barsi, Vice President -Business Development, Carbon Black.